This is an OpenPGP/MIME signed message (RFC 4880 and 3156)--===============1969117832391130653==Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="qnoVLpqqO8UWpQb52sA4Ea39vT8r3gRHT"

Hubert Kario discovered that GnuTLS incorrectly handled decoding a statusresponse TLS extension. A remote attacker could possibly use this issue tocause GnuTLS to crash, resulting in a denial of service. This issue onlyapplied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-7507)

It was discovered that GnuTLS incorrectly handled decoding certain OpenPGPcertificates. A remote attacker could use this issue to cause GnuTLS tocrash, resulting in a denial of service, or possibly execute arbitrarycode. (CVE-2017-7869)

Update instructions:

The problem can be corrected by updating your system to the followingpackage versions:

Ubuntu 17.04: libgnutls30 3.5.6-4ubuntu4.1

Ubuntu 16.10: libgnutls30 3.5.3-5ubuntu1.2

Ubuntu 16.04 LTS: libgnutls30 3.4.10-4ubuntu1.3

Ubuntu 14.04 LTS: libgnutls26 2.12.23-12ubuntu2.8

In general, a standard system update will make all the necessary changes.